Introduction - If you have any usage issues, please Google them yourself
Different point-to-point transmission method with the conventional encryption facsimile communication, in accordance with the characteristics of the facsimile communication protocol, for the special requirements of business secret, T 30 communication protocol transformation, have developed a new method of the central key distribution. Introduced transformation T 30 communication protocols, symmetric and asymmetric cryptographic algorithm to the T30 protocol custom non-standard frame authentication and the starting point for key distribution additional cryptographic algorithms to solve page working key in the C process synchronization and other issues .